Bugzilla – Full Text Bug Listing |
Summary: | VUL-1: CVE-2020-1927: apache2: mod_rewrite configurations vulnerable to open redirect | ||
---|---|---|---|
Product: | [Novell Products] SUSE Security Incidents | Reporter: | Wolfgang Frisch <wolfgang.frisch> |
Component: | Incidents | Assignee: | Security Team bot <security-team> |
Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
Severity: | Normal | ||
Priority: | P4 - Low | CC: | atoptsoglou, meissner, pgajdos, smash_bz |
Version: | unspecified | ||
Target Milestone: | --- | ||
Hardware: | Other | ||
OS: | Other | ||
URL: | https://smash.suse.de/issue/256263/ | ||
See Also: | https://bugzilla.suse.com/show_bug.cgi?id=1145738 | ||
Whiteboard: | CVSSv2:NVD:CVE-2020-1927:5.8:(AV:N/AC:M/Au:N/C:P/I:P/A:N) CVSSv3.1:NVD:CVE-2020-1927:6.1:(AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) | ||
Found By: | Security Response Team | Services Priority: | |
Business Priority: | Blocker: | --- | |
Marketing QA Status: | --- | IT Deployment: | --- |
Description
Wolfgang Frisch
2020-04-02 07:52:05 UTC
The most recent release note provides more details: >Changes with Apache 2.4.43 > > *) SECURITY: CVE-2020-1927 (cve.mitre.org) > rewrite, core: Set PCRE_DOTALL flag by default to avoid unpredictable > matches and substitutions with encoded line break characters. > The fix for CVE-2019-10098 was not effective. [Ruediger Pluem] This is addressed in SVN revision 1864213. https://svn.apache.org/viewvc?view=revision&revision=1864213 The aforementioned commit refers to the original vulnerability CVE-2019-10098 that was patched insufficiently by upstream. I believe the issue was fixed with these commits: SVN revision 1873905: factor out default regex flags SVN revision 1874191: add AP_REG_NO_DEFAULT to allow opt-out of pcre defaults https://svn.apache.org/viewvc?view=revision&revision=1873905 https://svn.apache.org/viewvc?view=revision&revision=1874191 Packages submitted for 15/apache2, 12sp2/apache2 and 12sp1/apache2. Submitted 2.4.43 into 15sp2/apache2. I believe all fixed. home:pgajdos:apache-test:after looks good. SUSE-SU-2020:1111-1: An update that fixes three vulnerabilities is now available. Category: security (important) Bug References: 1168404,1168407,1169066 CVE References: CVE-2020-1927,CVE-2020-1934,CVE-2020-1938 Sources used: SUSE Linux Enterprise Server for SAP 12-SP1 (src): apache2-2.4.16-20.29.1 SUSE Linux Enterprise Server 12-SP1-LTSS (src): apache2-2.4.16-20.29.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2020:1126-1: An update that fixes three vulnerabilities is now available. Category: security (important) Bug References: 1168404,1168407,1169066 CVE References: CVE-2020-1927,CVE-2020-1934,CVE-2020-1938 Sources used: SUSE Linux Enterprise Server for SAP 15 (src): apache2-2.4.33-3.30.1 SUSE Linux Enterprise Server 15-LTSS (src): apache2-2.4.33-3.30.1 SUSE Linux Enterprise Module for Server Applications 15-SP1 (src): apache2-2.4.33-3.30.1 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src): apache2-2.4.33-3.30.1 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): apache2-2.4.33-3.30.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): apache2-2.4.33-3.30.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. openSUSE-SU-2020:0597-1: An update that fixes three vulnerabilities is now available. Category: security (important) Bug References: 1168404,1168407,1169066 CVE References: CVE-2020-1927,CVE-2020-1934,CVE-2020-1938 Sources used: openSUSE Leap 15.1 (src): apache2-2.4.33-lp151.8.12.1 SUSE-SU-2020:1272-1: An update that fixes three vulnerabilities is now available. Category: security (important) Bug References: 1168404,1168407,1169066 CVE References: CVE-2020-1927,CVE-2020-1934,CVE-2020-1938 Sources used: SUSE OpenStack Cloud Crowbar 8 (src): apache2-2.4.23-29.54.1 SUSE OpenStack Cloud 8 (src): apache2-2.4.23-29.54.1 SUSE OpenStack Cloud 7 (src): apache2-2.4.23-29.54.1 SUSE Linux Enterprise Software Development Kit 12-SP5 (src): apache2-2.4.23-29.54.1 SUSE Linux Enterprise Software Development Kit 12-SP4 (src): apache2-2.4.23-29.54.1 SUSE Linux Enterprise Server for SAP 12-SP3 (src): apache2-2.4.23-29.54.1 SUSE Linux Enterprise Server for SAP 12-SP2 (src): apache2-2.4.23-29.54.1 SUSE Linux Enterprise Server 12-SP5 (src): apache2-2.4.23-29.54.1 SUSE Linux Enterprise Server 12-SP4 (src): apache2-2.4.23-29.54.1 SUSE Linux Enterprise Server 12-SP3-LTSS (src): apache2-2.4.23-29.54.1 SUSE Linux Enterprise Server 12-SP3-BCL (src): apache2-2.4.23-29.54.1 SUSE Linux Enterprise Server 12-SP2-LTSS (src): apache2-2.4.23-29.54.1 SUSE Linux Enterprise Server 12-SP2-BCL (src): apache2-2.4.23-29.54.1 SUSE Enterprise Storage 5 (src): apache2-2.4.23-29.54.1 HPE Helion Openstack 8 (src): apache2-2.4.23-29.54.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. Done |